pi openscad
ARMv8 Cortex-A72 testing with a BCM2835 Raspberry Pi 400 Rev 1.0 and V3D 4.2 4GB on Debian 10 via the Phoronix Test Suite.
1
Kernel Notes: snd_bcm2835.enable_compat_alsa=0 snd_bcm2835.enable_hdmi=1 snd_bcm2835.enable_headphones=1
Processor Notes: Scaling Governor: cpufreq-dt ondemand
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable + srbds: Not affected + tsx_async_abort: Not affected
2
3
Processor: ARMv8 Cortex-A72 @ 1.80GHz (4 Cores), Motherboard: BCM2835 Raspberry Pi 400 Rev 1.0, Memory: 4096MB, Disk: 32GB GB1QT, Graphics: V3D 4.2 4GB, Monitor: DELL P2210H
OS: Debian 10, Kernel: 5.4.51-v8+ (aarch64), Desktop: LXDE 0.10.0, Display Server: X Server 1.20.4, OpenGL: 2.1 Mesa 19.3.2, Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1920x1080
OpenSCAD
OpenSCAD is a programmer-focused solid 3D CAD modeller. OpenSCAD is free software and allows creating 3D CAD objects in a script-based modelling environment. This test profile will use the system-provided OpenSCAD program otherwise and time how long it takes tn render different SCAD assets to PNG output. Learn more via the OpenBenchmarking.org test page.
1
Kernel Notes: snd_bcm2835.enable_compat_alsa=0 snd_bcm2835.enable_hdmi=1 snd_bcm2835.enable_headphones=1
Processor Notes: Scaling Governor: cpufreq-dt ondemand
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 23 March 2021 10:54 by user root.
2
Kernel Notes: snd_bcm2835.enable_compat_alsa=0 snd_bcm2835.enable_hdmi=1 snd_bcm2835.enable_headphones=1
Processor Notes: Scaling Governor: cpufreq-dt ondemand
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 23 March 2021 12:13 by user root.
3
Processor: ARMv8 Cortex-A72 @ 1.80GHz (4 Cores), Motherboard: BCM2835 Raspberry Pi 400 Rev 1.0, Memory: 4096MB, Disk: 32GB GB1QT, Graphics: V3D 4.2 4GB, Monitor: DELL P2210H
OS: Debian 10, Kernel: 5.4.51-v8+ (aarch64), Desktop: LXDE 0.10.0, Display Server: X Server 1.20.4, OpenGL: 2.1 Mesa 19.3.2, Compiler: GCC 8.3.0, File-System: ext4, Screen Resolution: 1920x1080
Kernel Notes: snd_bcm2835.enable_compat_alsa=0 snd_bcm2835.enable_hdmi=1 snd_bcm2835.enable_headphones=1
Processor Notes: Scaling Governor: cpufreq-dt ondemand
Security Notes: itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 23 March 2021 14:19 by user root.